Every month, new developments and events impact the dark web and its users. The dark web is a hidden part of the internet frequently used for cybercrime, drug trafficking, and hacking.
This article compiles a selection of the most noteworthy and intriguing dark web stories from September 2024, including hacks into global health systems, millions of dollars being sold, emails being stolen, and a host of other stories.
It shows how the dark web threatens privacy, security, well-being, and society. It also discusses how to protect yourself from its dangers and raises awareness.
We will provide additional details, insights, and sources for each news article. This will enable you to take appropriate safety measures and remain engaged in the future.
Diddy allegedly sold a $500 million “Freak Off” dark web video featuring Justin Bieber, Drake, and other celebrities.
Jaguar Wright has accused Sean ‘Diddy’ Combs of selling a controversial “freak off” party video for $500 million on the dark web. Wright claims that the footage includes several high-profile celebrities and that Diddy sold the video out of desperation for cash. She points to an event in Calabasas where the footage allegedly captured questionable activities. Still, no evidence suggests that the celebrities mentioned were involved in illegal activities. Currently, Diddy is being held in a Brooklyn jail, facing charges of sex trafficking, racketeering, and multiple sexual assault allegations. His infamous ‘Freak Off’ parties, which allegedly involved coercion and violence, have been a key focus during his trial. Wright also discussed the role of the “dark coin” in keeping the videos from leaking off the dark web.
Despite her allegations, many fans and commentators have questioned the legitimacy of Wright’s claims. Social media users have mocked her statements, with some questioning her credibility. Wright’s claims have drawn attention, but her credibility remains a topic of debate.
FBI Takes Action Against Dark Web Marketplace Run by Kazakh and Russian Nationals
Two men, Alex Khodyrev and Pavel Kublitskii, have been indicted in the U.S. for allegedly managing a dark web marketplace called WWH Club, which specialises in selling sensitive personal and financial information. Khodyrev and Kublitskii, who acted as the central administrators of WWH Club and its sister sites, have been charged with conspiracy to commit access device fraud and conspiracy to commit wire fraud. The FBI launched an investigation in July 2020 after determining that WWH Club’s primary domain was resolved to an IP address belonging to DigitalOcean. The marketplaces were used to buy and sell stolen personal identifying information (PII), credit card and bank account information, and computer passwords. The darknet marketplace also offered online courses for aspiring and active cyber criminals on how to conduct fraud, with the cost ranging from 10,000 rubles to 60,000 rubles. Undercover FBI agents paid approximately $1,000 in Bitcoin to attend a training course on selling sensitive information, DDoS and hacking services, credit card skimmers, and brute-force programs. If convicted, they could face up to 20 years in federal prison and the forfeiture of Khodyrev’s 2023 Mercedes-Benz G63 AMG sport utility vehicle and Kublitskii’s 2020 Cadillac CT5 Sport sedan.
Users of the Tor Dark Web Browser Allegedly Unmasked by Police
A German news outlet, NDR, has reported that police have been able to de-anonymize several Tor users’ traffic using a “timing analyses” method. Police have been surveilling Tor servers in data centres and using the “Ricochet” chat service to identify Tor users and determine their entry points to the network. A German hacking group member, Chaos Computer Club, verified the method, adding that law enforcement authorities have repeatedly and successfully carried out timing analysis attacks against selected Tor users for several years to de-anonymize them.
In response to the German investigation, Tor said in a blog post that it is “still the best solution” for internet privacy but admits that its team is left with “more questions than answers” about what is happening. Tor hasn’t been able to verify NDR’s claims because the news outlet has yet to share or publicize its evidence.
The Tor browser allows users to access the “dark web” or websites not indexed by Google or other common search engines. It can also communicate anonymous tips and circumvent authoritarian government censorship. Nearly 43% of average daily Tor users are believed to be based in Russia, with nearly 16% in Iran and about 9% in the US. German users make up about 3% of Tor users, with France and China making up another 2% of the total user base.
Some Tor users are aware of the risk of de-anonymization and have previously discussed the possibility of their traffic being traced and tied to them as individuals. However, investigators would have to spend money to participate in the network and stay undetected for an extensive period of time to potentially unmask any traffic. The more nodes that exist, the more decentralized the network is; therefore, it is harder to monitor the entire network and piece together user identities.
Thousands of US political staffers’ personal information was exposed on the dark web
Swiss software developer Proton has released a security update revealing that nearly 20% of US political staffers have had their personal data leaked on the dark web following various hacks. The study, partnered with Constella Intelligence, analyzed 16,543 email addresses belonging to US political staffers, finding 3,191 at risk. Staffers are an entry point for would-be attackers as they can access sensitive information, including those that needs security clearance.
The research shows that nearly 300 staffers had details exposed in more than 10 leaks, with one person having 31 plain-text passwords exposed on the dark web. In total, Proton found 1,848 plain-text passwords associated with political staffers. The leaks also included information from social media, including 1,487 LinkedIn profiles, 416 Facebook profiles, and 347 X profiles.
Proton advises US political staffers to avoid their work addresses to sign up for third-party services unless absolutely necessary. Password managers like Proton’s Proton Pass can improve the security of login data and save unique passwords for various online services. Proton Pass can also hide real email addresses with aliases, preventing them from ending up in data spills on the dark web.
Proton offers services like Proton Pass Monitor and the Dark Web Monitoring service to help determine whether your data has been exposed. This advice is valid for any internet user juggling hundreds of different credentials. Proton has also done similar research on the EU and UK, finding politicians in those regions might be even worse than Americans when it comes to protecting their official work addresses.
Data on the Dark Web Allows Cyberattacks, and the Healthcare Vertical is a Top Ransomware Target
ChannelE2E reports on cybersecurity trends for managed service providers (MSSPs) and managed service providers (MSSPs). SonicWall reports that healthcare organizations remain prime targets for ransomware attacks, with a minimum of 14 million US patients affected by malware breaches. The increasing digitalization of health records and telehealth services significantly expands the attack surface. To defend against cyber threats, healthcare organizations must implement a multi-layered cybersecurity strategy, focusing on regular updates, strong access controls, and 24x7x365 monitoring.
SonicWall urges MSSPs and MSPs to implement robust security measures, monitor systems in real-time, and ensure compliance with regulatory standards. Many healthcare organizations operate with limited cybersecurity resources and often rely on outdated technology, making them even more susceptible to ransomware attacks. A study by Searchlight Cyber found that 60% of vulnerabilities were used against Microsoft Exchange.
The dark web is a critical area of security for MSSPs, as they monitor it for signs of potential attacks on their clients. Many organizations rely on MSSPs to safeguard sensitive data. Still, if this data is leaked or sold on the dark web, it can lead to data breaches, financial losses, and reputational damage. Cybercriminals often sell or share stolen credentials, malware, or exploits on the dark web before an attack is executed.
AI-enhanced malware attacks are a primary concern of U.S. IT professionals for 2025, with 60% of global IT professionals surveyed for GetApp’s 6th Annual Data Security Report stating that AI-enhanced threats signal the need for businesses to prioritize new defensive strategies. High Wire Networks has been doubling down on its cybersecurity services business, with CEO Mark Porter assembling his dream team of C-suite executives to take this strategy forward in the market.
Global Healthcare Cyberattacks Have Increased by 32% Due to Dark Web Sales
A report by Check Point Research has revealed a 32% surge in cyberattacks on healthcare organizations worldwide, leaving patients and their families vulnerable to financial gain. The global weekly average number of attacks per organization within the healthcare industry has increased by 32% over the same period last year, reaching 2,018 per week. The targeted institutions, including vulnerable hospitals, are constantly under the triple threat of cybercrime such as ransomware attacks, data theft, and even selling access to these critical healthcare networks on the dark web. The top regions of attack are the Asia-Pacific (APAC) region, Latin America, Europe, and North America. The World Health Organization (WHO) has declared 17 September World Patient Safety Day to highlight the risks associated with cyberattacks in the healthcare industry. Cybercriminals also use ransomware-as-a-service (RaaS) to target healthcare organizations, partnering with others to carry out attacks and siphoning off sensitive data. To mitigate these risks, healthcare organizations must adopt comprehensive cybersecurity measures, including technological solutions, employee training, and improved security policies.
Emails from 20% of US lawmakers and staff were compromised on the dark web.
A joint investigation by digital risk firm Constella Intelligence and privacy provider Proton has revealed that nearly 3,200 US politicians and staff have had their data leaked to the dark web, affecting nearly 20% of all people working in the US Congress. The leaks occurred primarily because staffers used their official email to sign up for various online services, including high-risk dating and adult websites. The research highlights existing vulnerabilities to national security, especially worrisome with the US presidential election looming in the background.
Proton, in collaboration with Constella Intelligence, has contacted all affected political staffers to inform them their personal details have been found on the dark web and offer guidance on how to mitigate potential risks. Experts call on anyone to employ more robust cybersecurity practices, whether they are high-profile targets or not.
To mitigate potential risks, it is essential to avoid using sensitive work email addresses for third-party services unless absolutely necessary. Using hide-my-email aliases instead can help mask your real email address. Enabling two-factor authentication protections, using a reliable password manager, and signing up for data alert services that notify you when your personal details have been exposed on the dark web are all crucial steps.